Which of the following would BEST prevent this from happening again?

A company has gone through a round of phishing attacks. More than 200 users have had their workstation infected because they clicked on a link in an email. An incident analysis has determined an executable ran and compromised the administrator account on each workstation. Management is demanding the information security...

November 9, 2021 No Comments READ MORE +

Which of the following practices should the prosecutor’s forensics team have used to ensure the suspect’s data would be admissible as evidence?

During a criminal investigation, the prosecutor submitted the original hard drive from the suspect’s computer as evidence. The defense objected during the trial proceedings, and the evidence was rejected . Which of the following practices should the prosecutor’s forensics team have used to ensure the suspect’s data would be admissible...

November 8, 2021 No Comments READ MORE +

Which of the following settings should be toggled to achieve the goal?

A security analyst is reviewing the corporate MDM settings and notices some disabled settings, which consequently permit users to download programs from untrusted developers and manually install them. After some conversations, it is confirmed that these settings were disabled to support the internal development of mobile applications. The security analyst...

November 8, 2021 No Comments READ MORE +

Which of the following BEST conveys the business impact for senior leadership?

Click on the exhibit buttons to view the four messages. A security architect is working with a project team to deliver an important service that stores and processes customer banking details. The project, internally known as ProjectX, is due to launch its first set of features publicly within a week,...

November 8, 2021 No Comments READ MORE +

As the security consultant on the project, which of the following should the project’s security consultant recommend as the NEXT step?

The data will be hosted and managed outside of the company’s geographical location The number of users accessing the system will be small, and no sensitive data will be hosted in the solution. As the security consultant on the project, which of the following should the project’s security consultant recommend...

November 8, 2021 No Comments READ MORE +

Which of the following architectural decisions would BEST reduce the likelihood of a successful attack without harming operational capability?

An architect was recently hired by a power utility to increase the security posture of the company’s power generation and distribution sites. Upon review, the architect identifies legacy hardware with highly vulnerable and unsupported software driving critical operations. These systems must exchange data with each other, be highly synchronized, and...

November 8, 2021 No Comments READ MORE +

Which of the following is the MOST likely reason for the team lead’s position?

A newly hired security analyst has joined an established SOC team. Not long after going through corporate orientation, a new attack method on web-based applications was publicly revealed. The security analyst immediately brings this new information to the team lead, but the team lead is not concerned about it. Which...

November 8, 2021 No Comments READ MORE +

Which of the following would be the BEST source of reference during the revision process?

A Chief Information Security Officer (CISO is reviewing and revising system configuration and hardening guides that were developed internally and have been used several years to secure the organization’s systems. The CISO knows improvements can be made to the guides. Which of the following would be the BEST source of...

November 7, 2021 No Comments READ MORE +

Which of the following should the company implement NEXT?

After multiple service interruptions caused by an older datacenter design, a company decided to migrate away from its datacenter. The company has successfully completed the migration of all datacenter servers and services to a cloud provider. The migration project includes the following phases: ✑ Selection of a cloud provider ✑...

November 7, 2021 No Comments READ MORE +

Which of the following is the appropriate command to disable the client’s IPv6 stack?

A security analyst, who is working in a Windows environment, has noticed a significant amount of IPv6 traffic originating from a client, even though IPv6 is not currently in use. The client is a stand-alone device, not connected to the AD that manages a series of SCADA devices used for...

November 7, 2021 No Comments READ MORE +